數據保護層 的英文怎麼說

中文拼音 [shǔbǎocéng]
數據保護層 英文
dpl data protection layer
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : i 量詞1 (用於重疊、積累的東西 如樓層、階層、地層) storey; tier; stratum 2 (用於可以分項分步的...
  • 數據 : data; record; information
  1. They are jinfo mountain in nanchuan county ( natural protection section ), wuling mountain in qianjiang county ( national emphases forest demonstration county which forest cover rate is beyond 50 % ) and zhongliang mountain in beibei county ( artificial destruction is very grave ). some main land use patterns i. e. woodland, garden, infield, abandon infield, shrub and grassplot are selected in those three sample sites. four aspects on soil fertility index of karst environment under different land use patterns in these three sample sites, are revealed in this paper, by using the field test, indoor measure and analysis, outdoor experiment and field investigation, and the knowledge and technique of soil, ecology, physics and chemistry etc. they are physical characteristic ( effective soil thickness, organic layer thickness, soil texture, water - stable aggregate and soil water etc. ), chemical fertility ( organism, omni - n, omni - p, omni - k, alkali - nitrogen, available p, available k and rapid available k etc. ), soil animalcule ( bacteria, fungi, actinomyces and their grosses ) and soil - seed - pool ( plant community diversity index ) in karst ecosystem

    本研究以重慶市的南川金佛山(自然區) 、黔江武陵山(國家重點退耕還林示範縣,森林覆蓋率50以上)和北碚中梁山(遭人為破壞嚴重)典型巖溶區為對象,選擇了幾種重要的利用方式,包括林地、果園、耕地、棄耕地和灌草坡,採用野外巖溶生態調查和室內試驗測量分析相結合的方法,以不同土地利用方式巖溶土壤肥力為重點,對不同土地利用方式土壤肥力特徵進行量化分析,找出巖溶土壤肥力差異的主要方面及其根本原因,論文主要從土壤剖面物理退化指標(有效土厚度、有機質厚度、質地、團聚體、水分含量等) ,化學肥力退化指標(有機質、全n 、全p 、全k 、堿解n 、速效p和速效k等) ,樣地土壤微生物指標(細菌、真菌、放線菌量及總量)以及樣地土壤種子庫植物群落多樣性等4個方面對重慶典型巖溶區的土壤肥力特徵進行了較為詳細的分析研究,為巖溶地區士壤資源的合理利用及結構的調控管理提供依
  2. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路ip包的安全
  3. The database engine uses intent locks to protect placing a shared lock or exclusive lock on a resource lower in the lock hierarchy

    庫引擎使用意向鎖來共享鎖( s鎖)或排他鎖( x鎖)放置在鎖次結構的底資源上。
  4. The paper analyzes the secure problem existing in the tcp / ip protocol, discusses the possibility and superiority of secure transmission in network layer, researches the architecture of protocol ipsec, presents the design thought of using ipsec to realize the secure transmission within the pbc ' s intranet under the windows. the paper gives a schema of secure transmission system in the pbc ' s intranet, realizes it using the windows kernel program technology and obeying the specifications of ndis and ipsec. the secure transmission system promotes the secure extent of the pbc ' s intranet

    論文針對人民銀行內聯網面臨的信息和安全傳輸問題,分析了tcp / ip協議存在的安全問題,探討了在tcp / ip網路實現安全傳輸的可能性和優越性,認真研究了ipsec協議體系結構和esp協議、 ah協議、 ike密鑰交換協議的原理,在既要已有投資,又要提高安全程度的前提下,提出了在windows操作系統下採用ipsec實現人民銀行內聯網安全傳輸的設計思想。
  5. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依;電子文件歸檔管理中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案中主要任務是建立電子檔案原始性、真實性檢驗及原始恢復管理措施,通過對電子檔案載體的維、建立電子檔案維管理的信息文檔等工作,確管期限中的電子檔案持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確體系」安全運行;加強「體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對電子文件、電子檔案信息原始性、真實性有著重要意義。
  6. Provides an additional layer of security against potential denial of service attacks when deserializing untrusted data

    默認情況下, xmlserializer為反序列化不可信時可能受到的拒絕服務攻擊增加了一安全
  7. If relevant, then checks whether it is concurrent incremental maintainable or self - maintainable. if the update satisfies self - maintenance, our mechanism queries auxiliary views ( instead of querying iss ) to avoid network transmission and make the materialized view consistent with underlying iss. the update which needs to maintain the view concurrently and incrementally can be handled by polec

    當收到更新后, pmdvm方法首先用相關性對其檢查,對不相關更新直接拋棄;對相關更新對其進行並發增量視圖維或自維機制檢查,對滿足自維的更新通過查詢輔助視圖(而不是查詢源)來避兔網路傳輸和使實化視圖與底持一致,對必須進行並發增量視圖維的更新由polec來處理。
  8. Different taxation level influence social structure change, in case exist the third part protection, may alter the prompting structure of act individual. social colony split into myriad small social colony according to market structure, accelerate the flow among estates

    一旦存在第三方的所有權,將改變行為個體的激勵結構,社會群體依市場結構分裂為無個小社會群體,促進階間的流動。
  9. 423 persons answered the questionnaires and 139 out of them were identified as ecotourists. the result of classification is proved to be effective by prediction validity test, content validity test, theory validity test and convergence validity test. in addition, the ecotourists were classified as hard ecotourists, frequent ecotourists and occasional ecotourists farther according to the times they traveled to nature - based destinations every year and their new ecological paradigm grade which is used to evaluate the visitors attitude to environment. frequent ecotourists and occasional ecotourists both fall category of soft ecotourists, so the " hard - soft " classification system is founded, which will help propel ecotourist studies in china to develop towards the current international mainstream of the field

    以北京市百花山自然區為例,在總結國外相關研究經驗的基礎上,採用k階最近鄰knn和反向傳播bp前饋型多神經網路所構成的綜合分類器對百花山遊客中的生態旅遊者進行識別,又根「每年去相對原始的自然區域的旅遊次」和環境態度尺度nep得分兩項指標將生態旅遊者進一步細分為嚴格的生態旅遊者經常的生態旅遊者和偶爾的生態旅遊者,其中經常的生態旅遊者和偶爾的生態旅遊者歸為一般的生態旅遊者,從而構建起嚴格的一般的生態旅遊者分類體系。
  10. However, measures taken to protect data integrity on a physical level include, among other things, restricting access to computers, keeping transmission media such as cables and connectors protected, and avoiding power outages and electrostatic discharges read " building the ideal web hosting facility : a physical security perspective " ; see

    無論如何,除了其他方法之外,在物理上採取的的措施包括,限制對計算機的訪問、持對傳輸媒介(比如電纜和連接器)的,以及避免停電和靜電釋放(閱讀「 building the ideal web hosting facility : a physical security perspective 」 ,參閱
  11. Chongqing expressway networking toll data communication network cotains 2 - ring and 8 - ray network structure based on expressway physical structure, setting up a trasmission trunk layer of sdh stm - 4 ( can be up - graded to stm - 16 ), and channel protection business entry layer consisting of sdh onu / olt stm - 1 ( can be up - graded to stm - 4 ). data exchange layer, through ip route exchange network above sdh network, forms 3 - level computer network structure of account settlement center - road section management company - toll station. to ensure obtaining original and reliable toll data from communication network, 2m circuitous chain is established between each toll station, accountsettlement center and road section management company, and also pstn dialing backup chain is set up between toll station and account settlement center. in order to maintain clock synchronization of the whole communication network, a proposal of sub - stage clock sychrononization signal network for differet network construction scale has been put forward in this design. in view of sensitivity and importance of toll data, this design particularly gives considerations of network safety and information safety for external and internel of network. therefore, communication safety, smoothness and reliability of networking toll system can be able to maintained in many ways

    重慶高速公路聯網收費通信網的結構是根高速公路的物理結構構築了2環8射的網狀結構,建立了以sdhstm - 4 (可升級到stm - 16 )的傳輸主幹,以sdhonu / oltstm - 1 (可升級到stm - 4 )組成的通道業務接入的交換是在sdh網之上的ip路由交換網,形成了結算中心-路段管理公司-收費站之間的3級計算機網路結構。為從通信網路上證收費的原始性和可靠性,每個收費站和結算中心、路段管理公司之間建立了2m迂迴鏈路,同時在收費站和結算中心之間建立了pstn的撥號備份鏈路。
  12. Firstly, object - oriented programming method and relation database technology are used to realize protective information management, with a multiple tires " client / server architecture. using it, the technical staffs can check all kinds of reports, fault waves and setting values of protection. secondly, based on protective principles of ta21 series protection devices, protective function is simulated by using object - oriented technology

    首先,本文將面向對象方法和關系庫技術結合起來,採用psmis的多客戶?服務器體系結構實現對信息的管理,以便供電段技術人員查看裝置的整定值、各種報告、故障錄波(系統不僅能顯示波形,還能動態顯示波形每一點的峰值、有效值、相位,甚至阻抗值及阻抗角、諧波含量等) 。
  13. Firstly, unlike other technologies that verify security at high - level protocol, verifying security at ip level is transparent to applications and end - users that don " t have to be modified even if there is any change at ip level. secondly, another conspicuous advantage is that it can be used on any machine that uses ip protocol to communicate. no matter ipsec runs on routers, on firewall machines, on various application servers, and on end - user desktop or laptop machines, it can verify security of network transmission

    首先,在通信協議底傳輸提供安全與其它在高協議中提供安全的技術不同,在ip提供安全性對應用程序和終端用戶都是透明的,不需要應用程序、其它通信次和網路部件做任何改動;其次, ipsec的另一個顯著特點是它幾乎可以運行在使用ip協議進行通信的任何機器上,不論是運行在路由器、防火墻主機、各種各樣的應用服務器上,還是運行在終端用戶的個人計算機或筆記本電腦上,它都能提供一定的安全障;最後,利用ipsec實現虛擬專用網是目前通過internet實現企業內部網的主要解決方案之一。
  14. First the thesis elaborate the basis principles of land sustainable use, according to the natural and social economy situation, the characteristics of the land use, the aids and the principle of evaluation, we work out an index system form four aspects of productivity, protection, viability, acceptability. the weigh of indexes are defined by means of analytic hierarchy process, the standardization of indexes are defined by effective function, then, we use multi - aid decision model which mainly reflects that indictors influence on aim and multi - aid liner function which mainly reflects aim the degree of land sustainable use during 1996 and 1999 in taigu

    論文從土地資源可持續利用的基本理論入手,結合太谷縣的自然、社會經濟狀況與土地利用的特點,依評價的目標和原則,從生產性、資源性、經濟可行性、社會可接受性四個方面,採用專家咨詢法建立了太谷縣土地資源可持續利用評價指標體系,採用次分析法確定了指標權重,應用功效函法進行評價指標的標準化處理,運用反映評價指標因子對評價目標的影響程度的多目標突變決策模型和反映評價目標的可持續利用程度的多目標線性加權相結合的方法,對太谷縣1996年到1999年的土地利用情況進行了評價。
  15. With the statistical data analysis method, according to the criminal lawsuits with civil lawsuits attached of some railway transportation intermediate court during 3 years, in my dissertation i commented on the actuality of the institution of the chinese criminal with civil lawsuit attached, revealed many problems of this institution during judicial practice and moused out the reasons from the following 3 sides, judicial concept, legislation and judges " quality. also, i analised the value and legitimacy of this institution and made clear its legal quality, attribute, principles. in conclusion, according to protect the parties, lawsuit rights and objective rights, i put in some constructive suggestions which can improve this institution further

    本文運用統計分析的方法,從某鐵路運輸中級法院近三年多來辦理的刑事附帶民事訴訟案件入手,總體上評價了我國刑事附帶民事訴訟制度的現狀,揭示了該制度在司法實踐存在的諸多問題,從司法理念、立法和法官素質面探詢了原因,分析了刑事附帶民事訴訟制度的價值及其存在的合理性,明確了刑事附帶民事訴訟制度的法律性質、特徵、原則,從當事人訴訟權利、實體權利出發,為進一步完善刑事附帶民事訴訟制度提出了具有建設性的意見。
  16. Abstract : the effective width model based on the surface topography of natural fracture, which is closely related to the mechanical and hydraulic characteristics, is established on the theories of fluid mechanics and oil / gas flow in porous media. the study aims at improvingformation damage control and temporary plugging technology for fractured reservoir

    文摘:在考慮裂縫表面的實際微觀形態的情況下,採用流體力學與滲流力學相結合的方法,提出了可為裂縫性儲實施暫堵技術提供定量依的有效寬度學模型。
  17. The key technologies, in my research, include how to organize and implement " multi - layered " structures, how to achieve " work flow " in " office automatization ", how to implement the technology on the information communion, encryption and protection, the technology on business guidance and audit, and the technology on the information protection and sharing

    「 oracle分散式庫遠程的維和安全性的研究」要解決的關鍵技術有多次架構的實現與如何組織、工作流技術在辦公自動化中如何實現、信息加密與技術的實現、業務監控與審計技術、信息和共享技術等地實現是解決這一問題的基本要素。
  18. It offer data confidentiality, integrity, data source identity certification and anti - replay protective etc. safe service for network layer and its upper protocol

    它為ip及其上協議提供了機密性、完整性、源身份認證、抗流量分析和反重放等安全服務。
  19. For protecting the safety of ip datagram, ipsec is present the mainstream network layer ' s safe mechanism

    對于ip報的安全而言, ipsec是目前主流的網路安全機制。
  20. With development of technology for substation automation, neither the traditional relay protection or monitoring device lonely nor the communication way of bay units is very difficult for the development and for the increase of real - time data of monitoring system

    隨著變電站自動化技術的發展,傳統功能單一的裝置或是測控節點已經很難滿足發展的需要。同時變電站間隔傳統的通訊方式,也難以滿足由於變電站自動化技術發展所帶來的實時監控系統不斷增多的要求。
分享友人